Closed
Bug 743497
Opened 13 years ago
Closed 13 years ago
Malicious "FlashPlayer 11" add-on
Categories
(Toolkit :: Blocklist Policy Requests, defect)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
FIXED
People
(Reporter: mhammell, Assigned: jorgev)
Details
Attachments
(1 file)
10.80 KB,
application/octet-stream
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
Steps to reproduce:
Downloaded add-on from
http://low-cost-stuff.net/r/play.php?id=1
Actual results:
loads getmobiles.js from the add-on
that injects http://mio98.hk/js.php
js.php:
Steals the Facebook cookies and session token
Uses a variety of spam messages / urls:
"[NEW V1DEO ] Lady Gagga was .raped ... shocking Here. is the Vide0" - http://bit.ly/HkensV
"Madonna caught having ANAL sex on airport! http://bit.ly/HhvSp4 click link to see the video."
Injects iframes to:
http://resultsz.com/search/anticheat6.php?username=mc0011
http://www.mp56a.com/rep.php?r
http://luxemil.com/search/test1.php
Posts on their friends' walls/timelines
Likes a page
Does captcha solving by sending captchas to
http://65.254.51.42/~lxcore/imvu/msg/api/s_c.php?u<escaped_captcha_url>
Posts on the victim's wall
Can also spam on Twitter
Expected results:
It should not steal the user's Facebook cookies / session tokens and then send spam to their friends or automate captcha solving without the user's consent.
Assignee | ||
Comment 1•13 years ago
|
||
ID: flash@adobee.com
Assignee: nobody → jorge
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Assignee | ||
Comment 2•13 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Updated•9 years ago
|
Product: addons.mozilla.org → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•